2007 looks like year of 'malware'

Sep 18, 2007

The problem of malicious software or malware appears to be getting exponentially worse. So far this year, IBM Internet Security Systems (ISS) X-Force research and development team has identified more than 210,000 new malware samples. That’s more than the team found during all of 2006.

According to the team’s report, Trojans (seemingly legitimate files that are actually malware) comprise the largest category so far in 2007, accounting for 28 percent of all malware. In 2006, Downloaders was the most common category. A downloader is a low-profile piece of malware that installs itself so that it can download and install a more sophisticated malware agent later.

"The X-Force security statistics report for 2006 predicted a continued rise in the sophistication of targeted, profit-motivated cyber attacks," said Kris Lamb, director of X-Force for IBM Internet Security Systems. "This directly correlates to the rise in popularity of Trojans that we are witnessing this year, as Trojans are often used by attackers to launch sustained, targeted attacks."

The report also says that underground, for-profit exploiters have adopted new marketing techniques. Among these is the option to “lease” an exploitive approach, cutting attackers’ initial investment.

The IBM team reports that Spain has taken South Korea's place as the highest source of phishing e-mails, accounting for 17.9 percent of the worldwide volume. Phishing involves bogus emails that try to lure recipients into revealing personal information such as passwords, bank account numbers and passwords.

Source: IBM

Explore further: A new app facilitates number and arithmetic learning in children with special educational needs

add to favorites email to friend print save as pdf

Related Stories

When the ATM runs Windows, how safe is your money?

Oct 13, 2014

How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced computers to shut down, knocked South Korea offl ...

Georgia Tech releases cyber threats forecast for 2013

Nov 14, 2012

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global ...

Cloud-based secure desktop streaming from any PC

Mar 06, 2012

Today at the CeBIT Fair, IBM is announcing the Secure Enterprise Desktop, an innovative service that enables corporate users to securely access the contents of their entire hard disk, including operating system, applications ...

Helping businesses defend against cyber threats

Dec 06, 2011

Analysts with the National Security Agency see the threats coming at corporate America: viruses, worms and other malware targeting the computer networks that serve the nation's banks, utilities and businesses.

Recommended for you

BPG image format judged awesome versus JPEG

Dec 17, 2014

If these three letters could talk, BPG, they would say something like "Farewell, JPEG." Better Portable Graphics (BPG) is a new image format based on HEVC and supported by browsers with a small Javascript ...

Atari's 'E.T.' game joins Smithsonian collection

Dec 15, 2014

One of the "E.T." Atari game cartridges unearthed this year from a heap of garbage buried deep in the New Mexico desert has been added to the video game history collection at the Smithsonian.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.